Security Challenges of Electronic Voting

  • Authors

    • Kalim Qureshi
    • Noha Abdallah
    https://doi.org/10.14419/ijet.v7i4.16.27843

    Received date: February 24, 2019

    Accepted date: February 24, 2019

    Published date: November 27, 2018

  • Electronic Voting System, E-Voting Security, Cryptography, Threats, and Attacks
  • Abstract

    In electron-voting system, different attacks and threats may be carried out depending on the operational environment in which the system is used. Voting systems can be easily exposed to attack from different serious threats of denial of service and a Man-in the-Middle attack. Cryptographic techniques like fingerprint sensor and digital signature scheme can be used in electronic voting. Combining two techniques like digital signature and blind signature or fingerprint may be the best solution for a secured electronic voting system. The purpose of this paper address the scope of electronic voting system, and examine the main security problems in electronic voting systems, particularly security threats related to electronic voting systems, the criteria of using electronic voting systems, and solutions to security threats.

  • References

    1. Abdullahi Lawal Abba , Mohammad Awad, Zakaria Al-Qudah, and Abdul Halim Jallad, "Security Analysis of Voting Systems", IEEE International conference on electrical and computing techniques and applications, 2017.
    2. Kareem M. Abosamra, Ahmed A. Abdelhafez, Ghazy M.R. Assas-sa, Monan F.M. Mursi, "Practical, Secure, and Auditable e-voting system", Journal of Information Security and Applications, Vol. 36, pp. 69-89, Elsevier, 2017.
    3. Hiaijun Pan, Edwin Hou and Nirwan Ansari, "Enhanced name and vote separated E-voting: an E-voting system that ensures voter con-fidentiality and candidate privacy", Security and communication networks, vol. 7, pp.2335-2344, Wiley, 2014.
    4. S.Nisha, Neela Madheswari, "Prevention of Phishing Attacks in Voting System using Visual Cryptography", International Confer-ence on Emerging Trends in Engineering, Technology and Science (ICETETS), pp. 3-35, 2016
    5. Craig Burton, Chris Culname, Steve Schneider, "vvote: Verifiable Electronic Voting in Practice", Security Smorgasbord, IEE comput-er and reliability societies, 2016
    6. Abdelwahab alsammak, Alaa abdelrahman, Tarek elshaistawy and aboubakr Elewa, “Cahllenges of Electronic Voting- A Survey”, ACSU Advances in Computer Science: An International Journal, Vol.4, issue 6, B0. 18, pp. 98-108,November 2015.
    7. Pankaj Kumar Malviya, “E-Voting System Using Cloud in Indian Scenario”, International Journal of Engineering Science & Ad-vanced Technology, Vol. 3, Issue 3, pp-171-176, 2014.
    8. Modelling Tools - IPO diagrams URL: https://sdd-hsc-online.wikispaces.com/Modelling+Tools+-+IPO+diagrams
    9. Nwogu Emeka Reginald, “Mobile, Secure E-Voting Architecture for the Nigerian Electoral System”, IOSR Journal of Computer En-gineering, Vol. 17, Issue 2, pp. 27-36, 2015.
    10. M. Nandha Kishore, A. Sridhar, S. Divakara,, “Advanced Security Strategy in Smart E-Voting System”, SSRG International Journal of Computer Science and Engineering, vol. 2, issue 6, pp.54-60. 2015.
    11. Rohan Patel, Vaibhav Ghorpade, Viny Jain and Mani Kambli, “Fin-gerprint Based e-voting System using Aadhar Database”, Interna-tional Journal for Research in Emerging Science and Technology, Vol. 2, Issue 3, pp. 86-90, 2015.
    12. Olayemi M, Olaniyi, Taiha A. Foloruni, “Design of Secture Elec-tronics Voting System using Finger Biometrics and Crypto-watermarking Approach”, I.J. Information Engineering and Elec-tronics Business, Vol. 5, Issue 9, pp. 9-17, 2016.
    13. atchaya arivalagam, nage nikitha peddi, wajdi bazuhair, elt, “study of wireless security attacks on medical devices”, international jour-nal of multidisciplinary in cryptology and information security, vol.6 no. 6, November-December, 2017, pp. 2320-2610.
  • Downloads

  • How to Cite

    Qureshi, K., & Abdallah, N. (2018). Security Challenges of Electronic Voting. International Journal of Engineering and Technology, 7(4.16), 250-254. https://doi.org/10.14419/ijet.v7i4.16.27843